Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer hardware & operating systems
This multi-contributed handbook focuses on the latest workings of IoT (internet of Things) and Big Data. As the resources are limited, it's the endeavor of the authors to support and bring the information into one resource. The book is divided into 4 sections that covers IoT and technologies, the future of Big Data, algorithms, and case studies showing IoT and Big Data in various fields such as health care, manufacturing and automation. Features Focuses on the latest workings of IoT and Big Data Discusses the emerging role of technologies and the fast-growing market of Big Data Covers the movement toward automation with hardware, software, and sensors, and trying to save on energy resources Offers the latest technology on IoT Presents the future horizons on Big Data
The book comprises a new method of solving the integral equation of Leontovich, the most rigorous and most effective equation for the current in thin linear antennas. The book describes the features of the new method in its application in various types of antennas. It considers new ways of analyzing antennas, in particular in the calculation of an antenna gain based on main radiation patterns and the calculation of the directional characteristics of radiators with known distribution of current amplitude. The method of electrostatic analogy proposed by the author, provides the base for comparison of electromagnetic fields of high-frequency currents and electrostatic charges located on linear conductors to improve the directional characteristics of log-periodic and director-type antennas. A new approach to the analysis of the electrical characteristics of a microstrip antenna, which allows expansion of its operation range, is substantiated and developed. New results of antenna synthesis are obtained. The second part of the book is devoted to specific types of antennas (the author had a significant role in their creation). Particular attention is given to ship antennas for different frequency ranges. The book is intended for professionals, working in electrodynamics and those working on development, placement and exploitation of antennas. It will be useful for lecturers (university-level professors), teachers, students of radio engineering and researchers working in various fields of radio electronics and interested in an in-depth study of theoretical problems and designs f antennas. It can also be used for short university courses.
Learn how to write R code with fewer bugs. The problem with programming is that you are always one typo away from writing something silly. Likewise with data analysis, a small mistake in your model can lead to a big mistake in your results. Combining the two disciplines means that it is all too easy for a missed minus sign to generate a false prediction that you don't spot until it's too late. Testing is the only way to be sure that your code, and your results, are correct. Testing R Code teaches you how to perform development-time testing using the testthat package, allowing you to ensure that your code works as intended. The book also teaches run-time testing using the assertive package; enabling your users to correctly run your code. After beginning with an introduction to testing in R, the book explores more advanced cases such as integrating tests into R packages; testing code that accesses databases; testing C++ code with Rcpp; and testing graphics. Each topic is explained with real-world examples, and has accompanying exercises for readers to practise their skills - only a small amount of experience with R is needed to get started!
The Healthcare industry is one of the largest and rapidly developing industries. Over the last few years, healthcare management is changing from disease centered to patient centered. While on one side the analysis of healthcare data plays an important role in healthcare management, but on the other side the privacy of a patient's record must be of equal concern. This book uses a research-oriented approach and focuses on privacy-based healthcare tools and technologies. It offers details on privacy laws with real-life case studies and examples, and addresses privacy issues in newer technologies such as Cloud, Big Data, and IoT. It discusses the e-health system and preserving its privacy, and the use of wearable technologies for patient monitoring, data streaming and sharing, and use of data analysis to provide various health services. This book is written for research scholars, academicians working in healthcare and data privacy domains, as well as researchers involved with healthcare law, and those working at facilities in security and privacy domains. Students and industry professionals, as well as medical practitioners might also find this book of interest.
This new and fully updated edition provides the practical course text to the Operating Systems required by the majority of degree and HND courses in Computing. It uses as a basis the familiar operating systems of UNIX, MSDOS and Windows. Colin Ritchie provides a clear introduction of all the terminology and concepts involved, and enables the reader to gain a thorough knowledge of the subject by blending technical discussion with real-practice issues, supported by practical exercises.
Enabling Technologies for Next Generation Wireless Communications provides up-to-date information on emerging trends in wireless systems, their enabling technologies and their evolving application paradigms. This book includes the latest trends and developments toward next generation wireless communications. It highlights the requirements of next generation wireless systems, limitations of existing technologies in delivering those requirements and the need to develop radical new technologies. It focuses on bringing together information on various technological developments that are enablers vital to fulfilling the requirements of future wireless communication systems and their applications. Topics discussed include spectrum issues, network planning, signal processing, transmitter, receiver, antenna technologies, channel coding, security and application of machine learning and deep learning for wireless communication systems. The book also provides information on enabling business models for future wireless systems. This book is useful as a resource for researchers and practitioners worldwide, including industry practitioners, technologists, policy decision-makers, academicians, and graduate students.
Contemporary High Performance Computing: From Petascale toward Exascale, Volume 3 focuses on the ecosystems surrounding the world's leading centers for high performance computing (HPC). It covers many of the important factors involved in each ecosystem: computer architectures, software, applications, facilities, and sponsors. This third volume will be a continuation of the two previous volumes, and will include other HPC ecosystems using the same chapter outline: description of a flagship system, major application workloads, facilities, and sponsors. Features: Describes many prominent, international systems in HPC from 2015 through 2017 including each system's hardware and software architecture Covers facilities for each system including power and cooling Presents application workloads for each site Discusses historic and projected trends in technology and applications Includes contributions from leading experts Designed for researchers and students in high performance computing, computational science, and related areas, this book provides a valuable guide to the state-of-the art research, trends, and resources in the world of HPC.
Exclusively covers interoperability of IoT systems in parallel with their use towards the development of smart systems Discusses the requirements of interoperability in smart IoT systems and their solutions Reviews IoT applications in different smart and intelligent systems Explores dealing with interoperability of heterogeneous participating devices Provides different case studies and open problems related to interoperability in IoT system
This book serves three basic purposes: (1) a tutorial-type reference for complex systems engineering (CSE) concepts and associated terminology, (2) a recommendation of a proposed methodology showing how the evolving practice of CSE can lead to a more unified theory, and (3) a complex systems (CSs) initiative for organizations to invest some of their resources toward helping to make the world a better place. A wide variety of technical practitioners-e.g., developers of new or improved systems (particularly systems engineers), program and project managers, associated staff/workers, funders and overseers, government executives, military officers, systems acquisition personnel, contract specialists, owners of large and small businesses, professional society members, and CS researchers-may be interested in further exploring these topics. Readers will learn more about CS characteristics and behaviors and CSE principles and will therefore be able to focus on techniques that will better serve them in their everyday work environments in dealing with complexity. The fundamental observation is that many systems inherently involve a deeper complexity because stakeholders are engaged in the enterprise. This means that such CSs are more difficult to invent, create, or improve upon because no one can be in total control since people cannot be completely controlled. Therefore, one needs to concentrate on trying to influence progress, then wait a suitable amount of time to see what happens, iterating as necessary. With just three chapters in this book, it seems to make sense to provide a tutorial introduction that readers can peruse only as necessary, considering their background and understanding, then a chapter laying out the suggested artifacts and methodology, followed by a chapter emphasizing worthwhile areas of application.
The book addresses the need to investigate new approaches to lower energy requirement in multiple application areas and serves as a guide into emerging circuit technologies. It explores revolutionary device concepts, sensors, and associated circuits and architectures that will greatly extend the practical engineering limits of energy-efficient computation. The book responds to the need to develop disruptive new system architecutres, circuit microarchitectures, and attendant device and interconnect technology aimed at achieving the highest level of computational energy efficiency for general purpose computing systems. Features Discusses unique technologies and material only available in specialized journal and conferences Covers emerging applications areas, such as ultra low power communications, emerging bio-electronics, and operation in extreme environments Explores broad circuit operation, ex. analog, RF, memory, and digital circuits Contains practical applications in the engineering field, as well as graduate studies Written by international experts from both academia and industry
The book addresses the need to investigate new approaches to lower energy requirement in multiple application areas and serves as a guide into emerging circuit technologies. It explores revolutionary device concepts, sensors, and associated circuits and architectures that will greatly extend the practical engineering limits of energy-efficient computation. The book responds to the need to develop disruptive new system architectures and semiconductor processes aimed at achieving the highest level of computational energy efficiency for general purpose computing systems. Discusses unique technologies and material only available in specialized journal and conferences. Covers emerging materials and device structures, such as ultra-low power technologies, nanoelectronics, and microsystem manufacturing. Explores semiconductor processing and manufacturing, device design, and performance. Contains practical applications in the engineering field, as well as graduate studies. Written by international experts from both academia and industry.
IoT is empowered by various technologies used to detect, gather, store, act, process, transmit, oversee, and examine information. The combination of emergent technologies for information processing and distributed security, such as Cloud computing, Artificial intelligence, and Blockchain, brings new challenges in addressing distributed security methods that form the foundation of improved and eventually entirely new products and services. As systems interact with each other, it is essential to have an agreed interoperability standard, which is safe and valid. This book aims at providing an introduction by illustrating state-of-the-art security challenges and threats in IoT and the latest developments in IoT with Cloud, AI, and Blockchain security challenges. Various application case studies from domains such as science, engineering, and healthcare are introduced, along with their architecture and how they leverage various technologies Cloud, AI, and Blockchain. This book provides a comprehensive guide to researchers and students to design IoT integrated AI, Cloud, and Blockchain projects and to have an overview of the next generation challenges that may arise in the coming years.
Trust and Records in an Open Digital Environment explores issues that arise when digital records are entrusted to the cloud and will help professionals to make informed choices in the context of a rapidly changing digital economy. Showing that records need to ensure public trust, especially in the era of alternative truths, this volume argues that reliable resources, which are openly accessible from governmental institutions, e-services, archival institutions, digital repositories, and cloud-based digital archives, are the key to an open digital environment. The book also demonstrates that current established practices need to be reviewed and amended to include the networked nature of the cloud-based records, to investigate the role of new players, like cloud service providers (CSP), and assess the potential for implementing new, disruptive technologies like blockchain. Stancic and the contributors address these challenges by taking three themes - state, citizens, and documentary form - and discussing their interaction in the context of open government, open access, recordkeeping, and digital preservation. Exploring what is needed to enable the establishment of an open digital environment, Trust and Records in an Open Digital Environment should be essential reading for data, information, document, and records management professionals. It will also be a key text for archivists, librarians, professors, and students working in the information sciences and other related fields.
Artificial Intelligence Techniques in IoT Sensor Networks is a technical book which can be read by researchers, academicians, students and professionals interested in artificial intelligence (AI), sensor networks and Internet of Things (IoT). This book is intended to develop a shared understanding of applications of AI techniques in the present and near term. The book maps the technical impacts of AI technologies, applications and their implications on the design of solutions for sensor networks. This text introduces researchers and aspiring academicians to the latest developments and trends in AI applications for sensor networks in a clear and well-organized manner. It is mainly useful for research scholars in sensor networks and AI techniques. In addition, professionals and practitioners working on the design of real-time applications for sensor networks may benefit directly from this book. Moreover, graduate and master's students of any departments related to AI, IoT and sensor networks can find this book fascinating for developing expert systems or real-time applications. This book is written in a simple and easy language, discussing the fundamentals, which relieves the requirement of having early backgrounds in the field. From this expectation and experience, many libraries will be interested in owning copies of this work.
This book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, "Hybrid Encryption Algorithms over Wireless Communication Channels", examines encrypted image and video data for the purpose of secure wireless communications. A study of two different families of encryption schemes are introduced: namely, permutation-based and diffusion-based schemes. The objective of the book is to help the reader selecting the best suited scheme for the transmission of encrypted images and videos over wireless communications channels, with the aid of encryption and decryption quality metrics. This is achieved by applying number-theory based encryption algorithms, such as chaotic theory with different modes of operations, the Advanced Encryption Standard (AES), and the RC6 in a pre-processing step in order to achieve the required permutation and diffusion. The Rubik's cube is used afterwards in order to maximize the number of permutations. Transmission of images and videos is vital in today's communications systems. Hence, an effective encryption and modulation schemes are a must. The author adopts Orthogonal Frequency Division Multiplexing (OFDM), as the multicarrier transmission choice for wideband communications. For completeness, the author addresses the sensitivity of the encrypted data to the wireless channel impairments, and the effect of channel equalization on the received images and videos quality. Complete simulation experiments with MATLAB (R) codes are included. The book will help the reader obtain the required understanding for selecting the suitable encryption method that best fulfills the application requirements.
This book focuses on RFID (Radio Frequency Identification), IoT (Internet of Things), and WSN (Wireless Sensor Network). It includes contributions that discuss the security and privacy issues as well as the opportunities and applications that are tightly linked to sensitive infrastructures and strategic services. This book addresses the complete functional framework and workflow in IoT-enabled RFID systems and explores basic and high-level concepts. It is based on the latest technologies and covers the major challenges, issues, and advances in the field. It presents data acquisition and case studies related to data-intensive technologies in RFID-based IoT and includes WSN-based systems and their security. It can serve as a manual for those in the industry while also helping beginners to understand both the basic and advanced aspects of IoT-based RFID-related issues. This book can be a premier interdisciplinary platform for researchers, practitioners, and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered, and find solutions that have been adopted in the fields of IoT and analytics.
This up-to-date reference discusses important concepts of vehicular communication in intelligent transportation systems. Augmented Intelligence Toward Smart Vehicular Applications begins by discussing key objectives of intelligent transport systems and vehicular ad-hoc networks (VANETs). It then goes on to discuss challenges, applications and future trends in VANETs. The text focuses on the organization of artificial intelligence (AI) and aspects of deep learning algorithms, particularly multimodal transport. This book will serve as an ideal reference for graduate students and academic researchers in the field of electrical engineering, electronics and communication engineering and transportation engineering. Features In-depth coverage of Internet of Things (IoT) in vehicular applications Discussion on nn-vehicle sensor networks Implementation of mobile IP and migration of IPv6 Focus on the need of AI in smart vehicular applications Discussions on advanced concepts in the field of intelligent transport systems
Unique selling point: Advanced technology and applications in the education domain Core audience: Academics and researchers Place in the market: Academic reference book
Provides a wide snapshot of building knowledge-based systems, inconsistency measures, methods for handling consistency, and methods for integrating knowledge bases. Provides the mathematical background to solve problems of restoring consistency and problems of integrating probabilistic knowledge bases in the integrating process. The research results presented in the book can be applied in decision support systems, semantic web systems, multimedia information retrieval systems, medical imaging systems, cooperative information systems, and more.
Enterprise servers play a mission-critical role in modern computing environments, especially from a business continuity perspective. Several models of IT capability have been introduced over the last two decades. Enhancing Business Continuity and IT Capability: System Administration and Server Operating Platforms proposes a new model of IT capability. It presents a framework that establishes the relationship between downtime on one side and business continuity and IT capability on the other side, as well as how system administration and modern server operating platforms can help in improving business continuity and IT capability. This book begins by defining business continuity and IT capability and their importance in modern business, as well as by giving an overview of business continuity, disaster recovery planning, contingency planning, and business continuity maturity models. It then explores modern server environments and the role of system administration in ensuring higher levels of system availability, system scalability, and business continuity. Techniques for enhancing availability and business continuity also include Business impact analysis Assessing the downtime impact Designing an optimal business continuity solution IT auditing as a process of gathering data and evidence to evaluate whether the company's information systems infrastructure is efficient and effective and whether it meets business goals The book concludes with frameworks and guidelines on how to measure and assess IT capability and how IT capability affects a firm's performances. Cases and white papers describe real-world scenarios illustrating the concepts and techniques presented in the book.
This book focuses on a specialized branch of the vast domain of software engineering: component-based software engineering (CBSE). Component-Based Software Engineering: Methods and Metrics enhances the basic understanding of components by defining categories, characteristics, repository, interaction, complexity, and composition. It divides the research domain of CBSE into three major sub-domains: (1) reusability issues, (2) interaction and integration issues, and (3) testing and reliability issues. This book covers the state-of-the-art literature survey of at least 20 years in the domain of reusability, interaction and integration complexities, and testing and reliability issues of component-based software engineering. The aim of this book is not only to review and analyze the previous works conducted by eminent researchers, academicians, and organizations in the context of CBSE, but also suggests innovative, efficient, and better solutions. A rigorous and critical survey of traditional and advanced paradigms of software engineering is provided in the book. Features: In-interactions and Out-Interactions both are covered to assess the complexity. In the context of CBSE both white-box and black-box testing methods and their metrics are described. This work covers reliability estimation using reusability which is an innovative method. Case studies and real-life software examples are used to explore the problems and their solutions. Students, research scholars, software developers, and software designers or individuals interested in software engineering, especially in component-based software engineering, can refer to this book to understand the concepts from scratch. These measures and metrics can be used to estimate the software before the actual coding commences.
Based on the technical accumulation and practice of Huawei iLab in the Cloud VR field, this book systematically describes the advantages of Cloud VR technologies; technical requirements on clouds, networks, and terminals as well as solution implementation; Cloud VR experience evaluation baselines and methods; and current business practices. Cloud VR introduces cloud computing and cloud rendering to VR services. With fast and stable networks, cloud-based display output and audio output are coded, compressed, and transmitted to user terminals, implementing cloud-based VR service content and content rendering. Cloud VR has stringent requirements on bandwidth and latency, making it a proficient application for 5G and gigabit home broadband networks in the era of "dual G". As the first advocate of Cloud VR, Huawei iLab developed the first prototype of the Cloud VR technical solution, initiated the industry's first Cloud VR industry cooperation plan - VR OpenLab with partners - and incubated the world's first Cloud VR commercial project with China Mobile Fujian. Cloud VR: Technology and Application is the first official publication of Huawei iLab's research and practice achievements. It systematically and thoroughly introduces the Cloud VR concept, solution architecture, key technologies, and business practices and is of great value in academic and social applications. This book is easy to understand, practical, and suitable for VR vendors, VR technology enthusiasts, carriers, network vendors, cloud service providers, universities, and other enterprises and scientific research institutes.
The twenty-first century is a time of intensifying competition and progressive digitization. Individual employees, managers, and entire organizations are under increasing pressure to succeed. The questions facing us today are: What does success mean? Is success a matter of chance and luck or perhaps is success a category that can be planned and properly supported? Business Intelligence and Big Data: Drivers of Organizational Success examines how the success of an organization largely depends on the ability to anticipate and quickly respond to challenges from the market, customers, and other stakeholders. Success is also associated with the potential to process and analyze a variety of information and the means to use modern information and communication technologies (ICTs). Success also requires creative behaviors and organizational cleverness from an organization. The book discusses business intelligence (BI) and Big Data (BD) issues in the context of modern management paradigms and organizational success. It presents a theoretically and empirically grounded investigation into BI and BD application in organizations and examines such issues as: Analysis and interpretation of the essence of BI and BD Decision support Potential areas of BI and BD utilization in organizations Factors determining success with using BI and BD The role of BI and BD in value creation for organizations Identifying barriers and constraints related to BI and BD design and implementation The book presents arguments and evidence confirming that BI and BD may be a trigger for making more effective decisions, improving business processes and business performance, and creating new business. The book proposes a comprehensive framework on how to design and use BI and BD to provide organizational success.
Move into iOS development by getting a firm grasp of its fundamentals, including the Xcode 9 IDE, Cocoa Touch, and the latest version of Apple's acclaimed programming language, Swift 4. With this thoroughly updated guide, you'll learn the Swift language, understand Apple's Xcode development tools, and discover the Cocoa framework. Explore Swift's object-oriented concepts Become familiar with built-in Swift types Dive deep into Swift objects, protocols, and generics Tour the lifecycle of an Xcode project Learn how nibs are loaded Understand Cocoa's event-driven design Communicate with C and Objective-C In this edition, catch up on the latest iOS programming features. Multiline strings and improved dictionaries Object serialization Key paths and key-value observing Expanded git integration Code refactoring And more! Once you master the fundamentals, you'll be ready to tackle the details of iOS app development with author Matt Neuburg's companion guide, Programming iOS 11
For more than a decade, the focus of information technology has been on capturing and sharing data from a patient within an all-encompassing record (a.k.a. the electronic health record, EHR), to promote improved longitudinal oversight in the care of the patient. There are both those who agree and those who disagree as to whether this goal has been met, but it is certainly evolving. A key element to improved patient care has been the automated capture of data from durable medical devices that are the source of (mostly) objective data, from imagery to time-series histories of vital signs and spot-assessments of patients. The capture and use of these data to support clinical workflows have been written about and thoroughly debated. Yet, the use of these data for clinical guidance has been the subject of various papers published in respected medical journals, but without a coherent focus on the general subject of the clinically actionable benefits of objective medical device data for clinical decision-making purposes. Hence, the uniqueness of this book is in providing a single point-of-capture for the targeted clinical benefits of medical device data--both electronic- health-record-based and real-time--for improved clinical decision-making at the point of care, and for the use of these data to address and assess specific types of clinical surveillance. Clinical Surveillance: The Actionable Benefits of Objective Medical Device Data for Crucial Decision-Making focuses on the use of objective, continuously collected medical device data for the purpose of identifying patient deterioration, with a primary focus on those data normally obtained from both the higher-acuity care settings in intensive care units and the lower-acuity settings of general care wards. It includes examples of conditions that demonstrate earlier signs of deterioration including systemic inflammatory response syndrome, opioid-induced respiratory depression, shock induced by systemic failure, and more. The book provides education on how to use these data, such as for clinical interventions, in order to identify examples of how to guide care using automated durable medical device data from higher- and lower-acuity care settings. The book also includes real-world examples of applications that are of high value to clinical end-users and health systems. |
You may like...
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,036
Discovery Miles 10 360
|